Skip to Content

1,825 Results Found

  • Article
  • Open Access
5 Citations
2,341 Views
20 Pages

22 May 2023

This paper investigated the co-design problem of less conservative integrated security control and communication for a nonlinear cyber-physical system (CPS) with an actuator fault and false data injection (FDI) attacks. Firstly, considering the effic...

  • Article
  • Open Access
6 Citations
3,489 Views
22 Pages

A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems

  • Qiang Hao,
  • Zhun Zhang,
  • Dongdong Xu,
  • Jiqing Wang,
  • Jiakang Liu,
  • Jinlei Zhang,
  • Jinhui Ma and
  • Xiang Wang

1 August 2022

As technology evolves, embedded systems access more networks and devices, which means more security threats. Existing security-monitoring methods with a single parameter (data or control flow) are not effective in detecting attackers tampering with t...

  • Article
  • Open Access
36 Citations
18,072 Views
13 Pages

Smart Home Automation—Use Cases of a Secure and Integrated Voice-Control System

  • Sitalakshmi Venkatraman,
  • Anthony Overmars and
  • Minh Thong

28 October 2021

Smart home automation is expected to improve living standards with the evolution of internet of things (IoT) that facilitate the remote control of residential appliances. There are, however, several factors that require attention for broader successf...

  • Article
  • Open Access
9 Citations
2,085 Views
22 Pages

30 April 2024

Within the domain of industrial control systems, safeguarding data integrity stands as a pivotal endeavor, especially in light of the burgeoning menace posed by malicious tampering and potential data loss. Traditional data storage paradigms, tethered...

  • Systematic Review
  • Open Access
1 Citations
2,728 Views
35 Pages

20 June 2025

Industrial Control Systems (ICSs), a specialized type of Cyber–Physical System, have shifted from isolated and obscured environments to ones exposed to diverse Information Technology (IT) security threats, which are now highly interconnected. T...

  • Systematic Review
  • Open Access
7 Citations
5,583 Views
26 Pages

2 December 2024

Today, IT organizations largely rely on cloud computing services to meet their infrastructure needs, making it the backbone of the industry. However, several challenges remain that need to be effectively addressed. Data breaches, identity and access...

  • Article
  • Open Access
14 Citations
5,720 Views
23 Pages

Prevention of Controller Area Network (CAN) Attacks on Electric Autonomous Vehicles

  • Salah Adly,
  • Ahmed Moro,
  • Sherif Hammad and
  • Shady A. Maged

18 August 2023

The importance of vehicle security has increased in recent years in the automotive field, drawing the attention of both the industry and academia. This is due to the rise in cybersecurity threats caused by (1) the increase in vehicle connectivity sch...

  • Article
  • Open Access
2 Citations
2,601 Views
22 Pages

15 May 2023

The Integrity Measurement Architecture subsystem on the Linux platform is a critical security component in the kernel to ensure the integrity of the running system. However, the default Integrity Measurement Architecture policy mechanisms based on op...

  • Article
  • Open Access
46 Citations
6,495 Views
23 Pages

Enhancing Industrial IoT Network Security through Blockchain Integration

  • Yash Bobde,
  • Gokuleshwaran Narayanan,
  • Manas Jati,
  • Raja Soosaimarian Peter Raj,
  • Ivan Cvitić and
  • Dragan Peraković

In the rapidly evolving landscape of industrial ecosystems, Industrial IoT networks face increasing security challenges. Traditional security methods often struggle to protect these networks adequately, posing risks to data integrity, confidentiality...

  • Article
  • Open Access
2 Citations
2,074 Views
26 Pages

Data security on the Internet of Things (IoT) is usually implemented through encryption. This paper presents a solution based on routing, in which data are forwarded only to entities that are intended to receive them according to security requirement...

  • Article
  • Open Access
21 Citations
7,555 Views
12 Pages

18 February 2013

This paper presents the synchronization between the master and slave Lorenz chaotic systems by slide mode controller (SMC)-based technique. A proportional-integral (PI) switching surface is proposed to simplify the task of assigning the performance o...

  • Article
  • Open Access
2 Citations
1,392 Views
18 Pages

15 August 2025

As Industrial Control Systems (ICSs) increasingly adopt cloud–edge collaborative architectures, they face escalating risks from complex cross-domain cyber threats. To address this challenge, we propose a novel threat assessment framework specif...

  • Article
  • Open Access
4 Citations
4,182 Views
14 Pages

21 December 2019

Currently, the dual use of IPv4 and IPv6 is becoming a problem. In particular, Network Address Translation (NAT) is an important issue to be solved because of traversal problems in end-to-end applications for lots of mobile IoT devices connected to d...

  • Article
  • Open Access
1 Citations
1,302 Views
19 Pages

23 February 2024

Electronic control strategies are pivotal in the evolution of power systems, which have higher requirements for power leveling and optimization, frequency safety, and frequency stability. In contrast, the core objectives of existing energy storage se...

  • Review
  • Open Access
68 Citations
13,568 Views
33 Pages

21 October 2015

The smart grid (SG) is a promising platform for providing more reliable, efficient, and cost effective electricity to the consumers in a secure manner. Numerous initiatives across the globe are taken by both industry and academia in order to compile...

  • Article
  • Open Access
6 Citations
6,012 Views
14 Pages

2 June 2015

At the center of core technologies for a future cyber world, such as Internet of Things (IoT) or big data, is a context-rich system that offers services by using situational information. The field where context-rich systems were first introduced is n...

  • Article
  • Open Access
135 Citations
12,962 Views
21 Pages

20 February 2021

Smart manufacturing systems are growing based on the various requests for predicting the reliability and quality of equipment. Many machine learning techniques are being examined to that end. Another issue which considers an important part of industr...

  • Article
  • Open Access
1,117 Views
22 Pages

10 November 2025

Intelligent in-vehicle voice systems face critical challenges in robustness, security, and semantic flexibility under complex acoustic conditions. To address these issues holistically, this paper proposes a novel multimodal and secure voice-control f...

  • Article
  • Open Access
5 Citations
4,433 Views
20 Pages

12 December 2024

Digital evidence plays a crucial role in cybercrime investigations by linking individuals to criminal activities. Data collection, preservation, and analysis can benefit from emerging technologies like blockchain to provide a secure, distributed ledg...

  • Article
  • Open Access
37 Citations
5,143 Views
16 Pages

Comparative Screening of Mexican, Rwandan and Commercial Entomopathogenic Nematodes to Be Used against Invasive Fall Armyworm, Spodoptera frugiperda

  • Patrick Fallet,
  • Lara De Gianni,
  • Ricardo A. R. Machado,
  • Pamela Bruno,
  • Julio S. Bernal,
  • Patrick Karangwa,
  • Joelle Kajuga,
  • Bancy Waweru,
  • Didace Bazagwira and
  • Ted C. J. Turlings
  • + 2 authors

16 February 2022

The fall armyworm (FAW), Spodoptera frugiperda Smith (Lepidoptera: Noctuidae) is an important pest of maize originating from the Americas. It recently invaded Africa and Asia, where it causes severe yield losses to maize. To fight this pest, tremendo...

  • Review
  • Open Access
1 Citations
3,574 Views
31 Pages

Transitioning from a Multi-Agency to an Integrated Food Control System: A Case Study from the Sultanate of Oman

  • Moza Abdullah Al Busaidi,
  • Mohammad Shafiur Rahman and
  • Hussein Samh Al Masroori

26 July 2025

Food safety regulations and their implementations are becoming increasingly complex due to various reasons such as diverse food sources, supply chain, processing technologies, distribution systems and environmental concerns. Additionally, it is cruci...

  • Article
  • Open Access
743 Views
28 Pages

4 December 2025

A secure and sustainable building access control system plays a vital role in protecting organisational assets worldwide. Physical access management at Auckland University of Technology (AUT) is still primarily done through traditional card-based aut...

  • Article
  • Open Access
2 Citations
3,019 Views
21 Pages

7 March 2025

In the Sahel, ensuring food security remains a critical challenge due to the region’s prolonged nine-month dry season and the severe scarcity of water resources for irrigation. This study explores an innovative approach integrating two traditio...

  • Article
  • Open Access
5 Citations
2,880 Views
20 Pages

The Digital Twin Modeling Method of the National Sliding Center for Intelligent Security

  • Zhansheng Liu,
  • Xiaotao Sun,
  • Zhe Sun,
  • Liang Liu and
  • Xiaolin Meng

29 April 2023

There are some problems in the security management of large stadiums, such as complex situations and a lack of coordination among systems. An intelligent security system can effectively improve the efficiency of security management. The digital twin...

  • Review
  • Open Access
22 Citations
6,452 Views
16 Pages

13 June 2024

Cyber–physical systems (CPSs), which combine computer science, control systems, and physical elements, have become essential in modern industrial and societal contexts. However, their extensive integration presents increasing security challenge...

  • Article
  • Open Access
13 Citations
3,718 Views
13 Pages

7 April 2021

Recently, damages such as internal system intrusion, network and device vulnerability attacks, malicious code infection, and information leakage due to security attacks are increasing within the smart grid environment. Detailed and dynamic access con...

  • Article
  • Open Access
4 Citations
6,090 Views
31 Pages

Holistic Information Security Management and Compliance Framework

  • Šarūnas Grigaliūnas,
  • Michael Schmidt,
  • Rasa Brūzgienė,
  • Panayiota Smyrli,
  • Stephanos Andreou and
  • Audrius Lopata

7 October 2024

The growing complexity of cybersecurity threats demands a robust framework that integrates various security domains, addressing the issue of disjointed security practices that fail to comply with evolving regulations. This paper introduces a novel in...

  • Article
  • Open Access
13 Citations
6,974 Views
13 Pages

21 August 2015

Currently, the demand for information security of industrial control systems is becoming more and more urgent, but the security model proposed by OPC UA cannot meet the practical requirements of industrial control systems. For this reason, this paper...

  • Article
  • Open Access
2 Citations
3,311 Views
20 Pages

Advanced Control Strategies for Securing UAV Systems: A Cyber-Physical Approach

  • Mohammad Sadeq Ale Isaac,
  • Pablo Flores Peña,
  • Daniela Gîfu and
  • Ahmed Refaat Ragab

This paper explores the application of sliding mode control (SMC) as a robust security enhancement strategy for unmanned aerial vehicle (UAV) systems. The study proposes integrating advanced SMC techniques with security protocols to develop a dual-pu...

  • Feature Paper
  • Article
  • Open Access
4 Citations
2,645 Views
14 Pages

20 April 2024

Security threat and risk assessment of systems requires the integrated use of information from multiple knowledge bases. Such use is typically carried out ad-hoc by security experts in an unstructured manner. Also, this ad-hoc use of information ofte...

  • Article
  • Open Access
8 Citations
4,510 Views
25 Pages

IOTASDN: IOTA 2.0 Smart Contracts for Securing Software-Defined Networking Ecosystem

  • Mohamed Fartitchou,
  • Ismail Lamaakal,
  • Yassine Maleh,
  • Khalid El Makkaoui,
  • Zakaria El Allali,
  • Paweł Pławiak,
  • Fahad Alblehai and
  • Ahmed A. Abd El-Latif

2 September 2024

Software-Defined Networking (SDN) has revolutionized network management by providing unprecedented flexibility, control, and efficiency. However, its centralized architecture introduces critical security vulnerabilities. This paper introduces a novel...

  • Review
  • Open Access
1 Citations
2,484 Views
24 Pages

An Overview of Distributed Firewalls and Controllers Intended for Mobile Cloud Computing

  • Cyril Godwin Suetor,
  • Daniele Scrimieri,
  • Amna Qureshi and
  • Irfan-Ullah Awan

13 February 2025

Mobile cloud computing (MCC) is a representation of the interaction between cloud computing and mobile devices, reshaping the utilisation of technology for consumers and businesses. This level of mobility and decentralisation of devices in MCC necess...

  • Article
  • Open Access
3 Citations
4,270 Views
34 Pages

22 March 2021

Recently, private security services have become increasingly needed by the public. The proposed scheme involves blockchain technology with a smart contract. When a private security company signs a contract with a client, they install an Internet of T...

  • Article
  • Open Access
5 Citations
2,658 Views
13 Pages

12 June 2021

Rapid and accurate detection of critical units is crucial for the security control of power systems, ensuring reliable and continuous operation. Inspired by the advantages of data-driven techniques, this paper proposes an integrated deep learning fra...

  • Article
  • Open Access
157 Citations
10,662 Views
24 Pages

Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security

  • Abdelouahid Derhab,
  • Mohamed Guerroumi,
  • Abdu Gumaei,
  • Leandros Maglaras,
  • Mohamed Amine Ferrag,
  • Mithun Mukherjee and
  • Farrukh Aslam Khan

15 July 2019

The industrial control systems are facing an increasing number of sophisticated cyber attacks that can have very dangerous consequences on humans and their environments. In order to deal with these issues, novel technologies and approaches should be...

  • Article
  • Open Access
8 Citations
2,778 Views
29 Pages

Zero Trust Strategies for Cyber-Physical Systems in 6G Networks

  • Abdulrahman K. Alnaim and
  • Ahmed M. Alwakeel

27 March 2025

This study proposes a Zero Trust security framework for 6G-enabled Cyber-Physical Systems (CPS), integrating Adaptive Access Control (AAC), end-to-end encryption, and blockchain to enhance security, scalability, and real-time threat detection. As 6G...

  • Article
  • Open Access
16 Citations
4,861 Views
22 Pages

Enabling Security Services in Socially Assistive Robot Scenarios for Healthcare Applications

  • Alexandru Vulpe,
  • Răzvan Crăciunescu,
  • Ana-Maria Drăgulinescu,
  • Sofoklis Kyriazakos,
  • Ali Paikan and
  • Pouyan Ziafati

18 October 2021

Today’s IoT deployments are highly complex, heterogeneous and constantly changing. This poses severe security challenges such as limited end-to-end security support, lack of cross-platform cross-vertical security interoperability as well as the lack...

  • Article
  • Open Access
2,528 Views
15 Pages

21 February 2025

Quantum information has emerged as a frontier in scientific research and is transitioning to real-world technologies and applications. In this work, we explore the integration of quantum secure direct communication (QSDC) with time-sensitive networki...

  • Article
  • Open Access
18 Citations
7,939 Views
24 Pages

Recent growth in the Internet of Things (IoT) looks promising for realizing a smart environment of the future. However, concerns about the security of IoT devices are escalating as they are inherently constrained by limited resources, heterogeneity,...

  • Review
  • Open Access
8 Citations
8,694 Views
38 Pages

SDN-Enabled IoT Security Frameworks—A Review of Existing Challenges

  • Sandipan Rakeshkumar Mishra,
  • Bharanidharan Shanmugam,
  • Kheng Cher Yeo and
  • Suresh Thennadil

This comprehensive systematic review examines the integration of software-defined networking (SDN) with IoT security frameworks, analyzing recent advancements in encryption, authentication, access control techniques, and intrusion detection systems....

  • Article
  • Open Access
1 Citations
2,529 Views
16 Pages

Integration of the Controlled Production of Huitlacoche (Ustilago maydis + Zea mays) in the Traditional Milpa System from Guerrero, Mexico

  • Sirilo Suastegui-Cruz,
  • Daniel Martínez-Carrera,
  • Miguel Sánchez,
  • Myrna Bonilla,
  • Ivan Castillo,
  • Alfredo Morales,
  • Nora Fernández,
  • Beatriz Petlacalco and
  • Wilfrido Martínez

5 December 2024

Food security has been an essential priority for decades due to its direct impact on human development. Despite significant advances in meeting basic food needs, food security remains a global challenge. In Mexico, the sustainable traditional polycul...

  • Review
  • Open Access
63 Citations
10,926 Views
21 Pages

Smart Grid Cyber Security Enhancement: Challenges and Solutions—A Review

  • Turki Alsuwian,
  • Aiman Shahid Butt and
  • Arslan Ahmed Amin

31 October 2022

The incorporation of communication technology with Smart Grid (SG) is proposed as an optimal solution to fulfill the requirements of the modern power system. A smart grid integrates multiple energy sources or microgrids and is supported by an extensi...

  • Article
  • Open Access
2 Citations
1,001 Views
33 Pages

BESS-Enabled Smart Grid Environments: A Comprehensive Framework for Cyber Threat Classification, Cybersecurity, and Operational Resilience

  • Prajwal Priyadarshan Gopinath,
  • Kishore Balasubramanian,
  • Rayappa David Amar Raj,
  • Archana Pallakonda,
  • Rama Muni Reddy Yanamala,
  • Christian Napoli and
  • Cristian Randieri

Battery Energy Storage Systems (BESSs) are critical to smart grid functioning but are exposed to mounting cybersecurity threats with their integration into IoT and cloud-based control systems. Current solutions tend to be deficient in proper multi-cl...

  • Review
  • Open Access
36 Citations
6,115 Views
17 Pages

Blockchain Platforms and Access Control Classification for IoT Systems

  • Adam Ibrahim Abdi,
  • Fathy Elbouraey Eassa,
  • Kamal Jambi,
  • Khalid Almarhabi and
  • Abdullah Saad AL-Malaise AL-Ghamdi

12 October 2020

The Internet of Things paradigm is growing rapidly. In fact, controlling this massive growth of IoT globally raises new security and privacy issues. The traditional access control mechanisms provide security to IoT systems such as DAC (discretionary...

  • Article
  • Open Access
25 Citations
4,490 Views
27 Pages

BCNBI: A Blockchain-Based Security Framework for Northbound Interface in Software-Defined Networking

  • Sultan Algarni,
  • Fathy Eassa,
  • Khalid Almarhabi,
  • Abdullah Algarni and
  • Aiiad Albeshri

Software-defined networking (SDN) has emerged as a flexible and programmable network architecture that takes advantage of the benefits of global visibility and centralized control over a network. One of the main properties of the SDN architecture is...

  • Article
  • Open Access
49 Citations
11,660 Views
24 Pages

Cyber Physical Systems Security for Maritime Assets

  • Iosif Progoulakis,
  • Paul Rohmeyer and
  • Nikitas Nikitakos

5 December 2021

The integration of IT, OT, and human factor elements in maritime assets is critical for their efficient and safe operation and performance. This integration defines cyber physical systems and involves a number of IT and OT components, systems, and fu...

  • Article
  • Open Access
2 Citations
2,235 Views
21 Pages

30 September 2024

As industries develop and informatization accelerates, enterprise collaboration is increasing. However, current architectures face malicious attacks, data tampering, privacy issues, and security and efficiency problems in information exchange and ent...

  • Review
  • Open Access
30 Citations
11,406 Views
52 Pages

15 March 2025

Blockchain-based data storage methods offer strong data integrity, decentralized security, and transparent access control but also face scalability challenges, high computational costs, and complex data management. This study provides a comprehensive...

  • Systematic Review
  • Open Access
5 Citations
9,219 Views
22 Pages

Smart Homes: A Meta-Study on Sense of Security and Home Automation

  • Carlos M. Torres-Hernandez,
  • Mariano Garduño-Aparicio and
  • Juvenal Rodriguez-Resendiz

This review examines advancements in smart home security through the integration of home automation technologies. Various security systems, including surveillance cameras, smart locks, and motion sensors, are analyzed, highlighting their effectivenes...

  • Article
  • Open Access
11 Citations
3,084 Views
14 Pages

17 November 2022

Recently, with the rapid development of data and information, it has become necessary to establish secure communications and appropriate security services to ensure a secure information exchange process. Therefore, to protect the privacy and confiden...

of 37